{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:39:52Z","timestamp":1730342392360,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.23919\/cnsm52442.2021.9615506","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:30:34Z","timestamp":1638477034000},"page":"28-34","source":"Crossref","is-referenced-by-count":0,"title":["A Hierarchical Tree-Based Syslog Clustering Scheme for Network Diagnosis"],"prefix":"10.23919","author":[{"given":"Sizhe","family":"Rao","sequence":"first","affiliation":[{"name":"AI Institute of H3C Technologies Co., Ltd.,Beijing,China"}]},{"given":"Minghui","family":"Wang","sequence":"additional","affiliation":[{"name":"AI Institute of H3C Technologies Co., Ltd.,Beijing,China"}]},{"given":"Cuixia","family":"Tian","sequence":"additional","affiliation":[{"name":"AI Institute of H3C Technologies Co., Ltd.,Beijing,China"}]},{"given":"Xin'an","family":"Yang","sequence":"additional","affiliation":[{"name":"AI Institute of H3C Technologies Co., Ltd.,Beijing,China"}]},{"given":"Xiangqiao","family":"Ao","sequence":"additional","affiliation":[{"name":"AI Institute of H3C Technologies Co., Ltd.,Beijing,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1063\/1.4977361"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CISP-BMEI.2017.8302317"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201818910012"},{"key":"ref15","first-page":"1997","article-title":"Survey of state-of-the-art log-based failure diagnosis","volume":"31","author":"jia","year":"2020","journal-title":"Journal of Software"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2663165.2663319"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30179-0_27"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990536"},{"key":"ref19","first-page":"188","article-title":"Behavioral anomaly detection approach based on log monitoring","author":"du","year":"0","journal-title":"2015 International Conference on Behavioral Economic and Socio-cultural Computing (BESC)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0967-0661(97)00050-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972691"},{"key":"ref5","first-page":"1","article-title":"Syslog processing for switch failure diagnosis and prediction in datacenter networks","author":"zhang","year":"0","journal-title":"2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS) IWQoS"},{"key":"ref8","first-page":"162","article-title":"Understanding and handling alert storm for online service systems","author":"zhao","year":"0","journal-title":"2020 IEEE\/ACM 42nd International Conference on Software Engineering Software Engineering in Practice (ICSE-SEIP)"},{"key":"ref7","first-page":"102","article-title":"Log Clustering Based Problem Identification for Online Service Systems","author":"lin","year":"2016","journal-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering Companion (ICSE-C) ICSE-C"},{"key":"ref2","first-page":"1","article-title":"Application of network alarm association analysis processing based on artificial intelligence","author":"lu","year":"2018","journal-title":"Designing Techniques of Posts and Telecommunications"},{"key":"ref9","first-page":"2364","article-title":"Research on pattern mining of alarm sequence based on network and time constraints","volume":"47","author":"xu","year":"2019","journal-title":"Computer and Digital Engineering"},{"journal-title":"Method and system for fault diagnosis in a data network","year":"2006","author":"g\u00fcrer","key":"ref1"},{"key":"ref20","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability"},{"key":"ref22","first-page":"44","article-title":"Umbc_ebiquity-core: Semantic textual similarity systems","author":"han","year":"0","journal-title":"Second Joint Conference on Lexical and Computational Semantics (* SEM) Volume 1 Proceedings of the Main Conference and the Shared Task Semantic Textual Similarity"},{"key":"ref21","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"96","author":"ester","year":"0","journal-title":"KDD"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544886"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2007.4629246"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2016.7820614"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3156-4_61"}],"event":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2021,10,25]]},"location":"Izmir, Turkey","end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 17th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615441\/9615442\/09615506.pdf?arnumber=9615506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:01:16Z","timestamp":1659484876000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/cnsm52442.2021.9615506","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}